Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You’re thinking in terms of encryption, I’m thinking in terms of attestation. Eg, defend against root kits by way of validating all software components in the boot cycle.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: